Skip to main content

Home/ Digit_al Society/ Group items matching "attack" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
dr tech

Police launch inquiry after MPs targeted in apparent 'spear-phishing' attack | Police | The Guardian - 0 views

  •  
    "A police investigation has been launched after MPs were apparently targeted in a "spear-phishing" attack, in what security experts believe could be an attempt to compromise parliament. A police force said it had started an inquiry after receiving a complaint from an MP who was sent a number of unsolicited messages last month."
dr tech

Details of millions of UK voters accessed by Chinese state, ministers will say | Cyberwar | The Guardian - 0 views

  •  
    "The personal details of millions of voters are believed to have been accessed in an attack by China on Britain's democratic process, ministers will say. MPs and peers are thought to be among 43 people who the government looks set to confirm have been targeted by cyber-attacks backed by the Chinese state. The UK could impose sanctions on individuals believed to be involved in these acts of state-backed interference, one of which was a separate attack on the Electoral Commission in which Beijing accessed the personal details of about 40 million voters."
dr tech

Seized ransomware network LockBit rewired to expose hackers to world | Cybercrime | The Guardian - 0 views

  •  
    "The organisation is a pioneer of the "ransomware as a service" model, whereby it outsources the target selection and attacks to a network of semi-independent "affiliates", providing them with the tools and infrastructure and taking a commission on the ransoms in return. As well as ransomware, which typically works by encrypting data on infected machines and demanding a payment for providing the decryption key, LockBit copied stolen data and threatened to publish it if the fee was not paid, promising to delete the copies on receipt of a ransom."
dr tech

Democrats sound alarm over AI robocall to voters mimicking Biden | Joe Biden | The Guardian - 0 views

  •  
    "A prominent New Hampshire Democrat said the makers of a robocall mimicking the voice of Joe Biden and encouraging Democrats not to vote in the primary on Tuesday should be "prosecuted to the fullest extent" for attempting "an attack on democracy" itself."
dr tech

British Library says final cost of cyber attack is 'not confirmed' | Barrhead News - 0 views

  •  
    "The library outside St Pancras International station, which has one of the largest book collections in the world, said it has its own financial reserves and has not applied for extra funding. A spokesperson said: "The final costs of recovering from the recent cyber attack are still not confirmed. "The British Library and its Government sponsor, the Department for Culture, Media and Sport (DCMS), remain in close and regular contact."
dr tech

EU agrees 'historic' deal with world's first laws to regulate AI | European Union | The Guardian - 0 views

  •  
    "The European Parliament secured a ban on use of real-time surveillance and biometric technologies including emotional recognition but with three exceptions, according to Breton. It would mean police would be able to use the invasive technologies only in the event of an unexpected threat of a terrorist attack, the need to search for victims and in the prosecution of serious crime."
dr tech

'The Gospel': how Israel uses AI to select bombing targets in Gaza | Israel | The Guardian - 0 views

  •  
    "Sources familiar with how AI-based systems have been integrated into the IDF's operations said such tools had significantly sped up the target creation process. "We prepare the targets automatically and work according to a checklist," a source who previously worked in the target division told +972/Local Call. "It really is like a factory. We work quickly and there is no time to delve deep into the target. The view is that we are judged according to how many targets we manage to generate." A separate source told the publication the Gospel had allowed the IDF to run a "mass assassination factory" in which the "emphasis is on quantity and not on quality". A human eye, they said, "will go over the targets before each attack, but it need not spend a lot of time on them". For some experts who research AI and international humanitarian law, an acceleration of this kind raises a number of concerns."
dr tech

Rhysida, the new ransomware gang behind British Library cyber-attack | Cybercrime | The Guardian - 0 views

  •  
    "While the name behind the attack might be relatively new, the criminal technique is not. Ransomware gangs render an organisation's computers inaccessible by infecting them with malicious software - malware - and then demanding a payment, typically in cryptocurrency, to unlock the files. In recent years, however, in a process dubbed "double extortion", the majority of gangs steal data at the same time and threaten to release it online, which they hope will strengthen their negotiating hand."
dr tech

'I employ a lot of hackers': how a stock exchange chief deters cyber-attacks | Cyberwar | The Guardian - 0 views

  •  
    "After "social engineering" efforts using personal details to target staff were uncovered, badges no longer carry last names, clean-desk policies are far more strictly enforced and the processing and communication of sensitive information is now subject to higher bars of regular mandatory training."
dr tech

TikTok 'aggressively' taking down videos promoting Bin Laden 'letter to America' | TikTok | The Guardian - 0 views

  •  
    "In response to the letter's renewed spread, Guardian News and Media removed it on 15 November 2023, replacing it with the statement: "The transcript published on our website had been widely shared on social media without the full context. Therefore we decided to take it down and direct readers instead to the news article that originally contextualised it." In a statement on Thursday, the White House said: "There is never a justification for spreading the repugnant, evil, and antisemitic lies that the leader of al Qaeda issued just after committing the worst terrorist attack in American history"."
dr tech

Social media urged to act on violent content after Hamas attack | Social media | The Guardian - 0 views

  •  
    "The coverage of the Israel-Hamas conflict on social media platforms has come under scrutiny from the UK government and Brussels, as tech firms including X and Meta were urged to deal with a surge in violent and misleading content on their sites. In the UK, the technology secretary summoned social media executives on Wednesday to demand the removal from their platforms of violent content related to the Hamas attacks on Israel."
dr tech

The Folly of DALL-E: How 4chan is Abusing Bing's New Image Model - bellingcat - 0 views

  •  
    "Racists on the notorious troll site 4chan are using a powerful new and free AI-powered image generator service offered by Microsoft to create antisemitic propaganda, according to posts reviewed by Bellingcat. Users of 4chan, which has frequently hosted hate speech and played home to posts by mass shooters, tasked Bing Image Creator to create photo-realistic antisemitic caricatures of Jews and, in recent days, shared images created by the platform depicting Orthodox men preparing to eat a baby, carrying migrants across the US border (the latter a nod to the racist Great Replacement conspiracy theory), and committing the 9/11 attacks."
dr tech

Encryption services are sending the right message to the quantum codebreakers | John Naughton | The Guardian - 0 views

  •  
    "The folks at Signal are taking one of the four post-quantum cryptography algorithms that have been chosen by the US National Institute of Standards and Technology to withstand attacks by quantum computers, but instead of using it to replace their existing public-key encryption system, they are layering the new algorithm on top of what they already have. "We are augmenting our existing cryptosystems," they say, "such that an attacker must break both systems in order to compute the keys protecting people's communications." And they will be rolling out this augmented system to all users in the next few months."
dr tech

'I can't kill a wolf but will happily watch a Sim drown': murder and morality in video games | Games | The Guardian - 0 views

  •  
    "Ican kill foxes but I can't kill wolves. Not in real life, obviously - in real life I send emails eight hours a day - but in The Legend of Zelda: Tears of the Kingdom, where every animal is an arrow away from becoming a fortifying meal. Shoot a wolf and you'll be rewarded with a thick red slab of raw prime meat, but I can't do it, I just can't do it, even though they often attack me in packs. They look too much like dogs."
dr tech

MIT's 'PhotoGuard' protects your images from malicious AI edits | Engadget - 0 views

  •  
    "PhotoGuard works by altering select pixels in an image such that they will disrupt an AI's ability to understand what the image is. Those "perturbations," as the research team refers to them, are invisible to the human eye but easily readable by machines. The "encoder" attack method of introducing these artifacts targets the algorithmic model's latent representation of the target image - the complex mathematics that describes the position and color of every pixel in an image - essentially preventing the AI from understanding what it is looking at."
dr tech

They lost their kids to Fortnite - Macleans.ca - 0 views

  •  
    "That evening was the start of a long nightmare. Whenever Alana forbade Cody from gaming, he had panic attacks, wailing and weeping. He writhed on the floor and told his parents he wanted to die. "It was like taking heroin away from an addict," says Alana. Sometimes she thought, maybe today it will be different, and so she let him play. But the behaviour never changed. "We felt like his drug dealers.""
dr tech

Distressing Annecy footage put social media's self-regulation to the test | France | The Guardian - 0 views

  •  
    "Most social media users know to self-regulate when violent events such as terror attacks occur: don't share distressing footage; don't spread unfounded rumours. But in the aftermath of the Annecy attack some inevitably acted without restraint. Bystander footage of a man attacking children in a park in south-east France appeared online after the attack on Thursday and was still available, on Twitter and TikTok, on Friday. The distressing footage has been used by TV networks but is heavily edited. The raw versions seen by the Guardian show the attacker dodging a member of the public and running around the playground before appearing to stab a toddler in a pushchair."
dr tech

US military drone controlled by AI killed its operator during simulated test | US military | The Guardian - 1 views

  •  
    "In a simulated test staged by the US military, an air force drone controlled by AI killed its operator to prevent it from interfering with its efforts to achieve its mission, an official said last month. AI used "highly unexpected strategies to achieve its goal" in the simulated test, said Col Tucker 'Cinco' Hamilton, the chief of AI test and operations with the US air force, during the Future Combat Air and Space Capabilities Summit in London in May. Hamilton described a simulated test in which a drone powered by artificial intelligence was advised to destroy enemy's air defense systems, and attacked anyone who interfered with that order."
dr tech

Experts warn of new spyware threat targeting journalists and political figures | Hacking | The Guardian - 0 views

  •  
    "Researchers at the Citizen Lab at the University of Toronto's Munk School said the spyware, which is made by an Israeli company called QuaDream, infected some victims' phones by sending an iCloud calendar invitation to mobile users from operators of the spyware, who are likely to be government clients. Victims were not notified of the calendar invitations because they were sent for events logged in the past, making them invisible to the targets of the hacking. Such attacks are known as "zero-click" because users of the mobile phone do not have to click on any malicious link or take any action in order to be infected."
dr tech

Generative AI Is Enabling Fraud and Misinformation - Here Is What You Should Know | by Waleed Rikab, PhD | Jan, 2023 | Medium - 0 views

  •  
    "ussian, North Korean, or Iranian state backed-hackers, for example, might now be able to execute much more convincing social engineering and election interference schemes in the US using this tool. ChatGPT can also generate multiple versions of these campaigns and many fake online profiles to promote them, to allow the success of such attacks through sheer volume or variation in content."
1 - 20 of 148 Next › Last »
Showing 20 items per page